Linux Install tor and privoxy To Communicate Anonymously On the Internet

Question: How do I install Tor (The Onion Router) software under Debian / Ubuntu Linux? How do I communicate anonymously on the Internet? How do I anonymously browser the Internet so that I can avoid network surveillance that threatens personal freedom and privacy under Linux operating systems?Answer: Onion routing is a system enabling its users to communicate anonymously on the Internet. You need to install following softwares:

Configure browser for tor

Set 127.0.0.1 and 8118 as privoxy server IP and port number. Now Firefox is ready to use with Tor.

Firefox Torbutton plugin

You can also install Torbutton plugin, for best safety. Simply grab and install the Torbutton plugin, restart your Firefox, and you’re all set to use Tor. From the project page:

Torbutton provides a button to securely and easily enable or disable the browser’s use of Tor. It is currently the only addon that will safely manage your Tor browsing to prevent IP address leakage, cookie leakage, and general privacy attacks.

Further readings:

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

Your support makes a big difference:

I have a small favor to ask. More people are reading the nixCraft. Many of you block advertising which is your right, and advertising revenues are not sufficient to cover my operating costs. So you can see why I need to ask for your help. The nixCraft takes a lot of my time and hard work to produce. If everyone who reads nixCraft, who likes it, helps fund it, my future would be more secure. You can donate as little as $1 to support nixCraft:

In September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts.[15] As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g. SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor’s anonymity for security.